Networking the Cloud for IoT – Pt. 1: IoT and the Government

Great Leaders Are Ambidextrous, Are You?

By G C Network | November 17, 2014

By: Melvin Greer Managing Director, Greer Institute  There are many important characteristics of great leaders. Team players, good listeners and visionary are clear hallmarks. But being ambidextrous is required now…

Cloud Computing Advantages and Disadvantages

By G C Network | November 13, 2014

What is Cloud Computing & what are its advantages & disadvantages. Join us for this installment of our Technical Insight series as expert Learning Tree instructor Kevin Jackson examines the…

Ingram Micro Honors Veterans with a $10,000 Gift to Veterans 360

By G C Network | November 13, 2014

On Veteran’s Day, hundreds of military veterans, active-duty service members and retirees were recognized and celebrated along with family members at the third annual Ingram Micro Veterans Day ceremonies held…

What Are You Waiting For? The Cloud Era is HERE!

By G C Network | November 11, 2014

by Kevin L. Jackson (This post first appeared at https://blog.learningtree.com) The revolutionary business aspects of cloud excite me every day, but the business diversity is even more exciting. This fact…

Schizophrenic About Cloud?

By G C Network | November 5, 2014

By Kevin L. Jackson This week Dell released its first Global Technology Adoption Index (GTAI). This survey of more than 2,000 global organizations took a close look at how organizations…

Why You Need to Pay Attention to Cloud Computing

By G C Network | October 23, 2014

(This post was originally published by Learning Tree International  https://blog.learningtree.com/why-you-need-to-pay-attention-to-cloud-computing/ ) The adoption of cloud computing is revolutionizing today’s business. This trend has also elevated the importance of IT and…

Thriving in a Cloud, Big Data, Mobility and Security World

By G C Network | October 21, 2014

“The next generation of technology solutions will transform lives, businesses and economies.” This is the theme at this year’s Dell World opening keynote and this view is supported by Gartner’s…

Vets360 Founder Rick Collins Being Honored at the ‘Champions’ Leadership Conference

By G C Network | October 20, 2014

Veteran’s 360 and Rick Collins, Founder & Executive Director of Vets 360, Inc., are being honored at this year’sChampions Leadership, and Research Conference™ . This event, November 6th-7th, 2014 at…

“Cloud Musings” Joins Dell Content Provider Network

By G C Network | October 16, 2014

Cloud Musings, a GovCloud Network Property, is proud and honored to announce that we will now be serving over 3 Million Dell Community online daily viewers. Our content will focus…

Grounding the Cloud: Basics and Brokerage

By G C Network | September 29, 2014

“Picture Ben Franklin attempting to harness energy from a lightning-filled sky. The key tied to his kite was the middleman between electricity and the ground. This book details how using…

 
Dwight Bues & Kevin Jackson

This is Part 1 of a three part series that addresses the need for a systems engineering approach to IoT and cloud network design:
The “Internet of Things” depends on the “Cloud” for the processing and storage of data. The Cloud’s backbone, however, is the network. This logic train reveals the importance of professional rigor and solid System Engineering (SE) of the network.
Imagine a sea of sensors, put out in the field by multiple independent vendors. Complying with specifications only in an informal sense, these sensors are sending Terabytes of data to the cloud. The availability of this data to anyone globally is impressive enough. But even more amazing is the fact that anyone in the world can also develop an application or a powerful API to filter out the “nuggets” of valuable information.
This is why businesses everywhere are investing heavily into IoT’s promise. It also drives a real expectation that IoT will deliver cognition, an ability to acquire knowledge and understanding through “thought, experience, and the senses” to the Cloud. Dr. Dennis Curry, of Konica/Minolta, even hinted that “Cognition” at the IoT level is actually possible. As stated in his white paper Genius of Things, “…the real promise of the IoT [is] its potential to deliver such a leap of insight about the world around us. Only when this becomes a reality will we understand the true genius made possible by connecting many things together.”
IoT and the Government
Stuart Ravens of Ovum, in his White Paper, Understanding the IoT Opportunity: An Industry Perspective, postulated that a smart streetlight could send status updates to a central facility. If the streetlight failed, it would cause a work order to be generated, and if there were no replacements in stock, a Purchase Order to procure a replacement part could be automatically produced, and an install date, scheduled. Metrics could be generated on failure rates which could pre-position replacement parts or pre-schedule fix dates. While we recognize the “Nirvana” aspect of this “Smart Cities” technology, there are many pitfalls. This single item is likely one of thousands of items for which Municipal governments must accept maintenance responsibility for, singling out one item for maintenance is probably not a good idea. Other municipal government consumable procurements could include: Chlorine and Fluorine gas (and filters) for fresh water treatment, Ferric Sulfate for removing nitrates from effluent water recovered during sewage treatment, diesel fuel for backup generators, also gravel and asphalt for pavement repair. At some level, a multi-disciplined Engineering team needs to be employed to tease out the most important  needs.
To do this, a Concept of Operations (CONOPS) development process is leveraged to gather all of the varieties of goods that the government purchases into one procurement document. These items can then be prioritized by cost, operational values and other factors to address temporal response levels, public safety implications and maybe even political sensitivities. Only then could one even start to determine what would be bought, how, and by whom. This may be a simplistic example, but many Plant Managers could verify that this holistic approach is necessary to prevent the inevitable “whack-a-mole” effect that happens when cost is unilaterally driven down in one area, only to have it pop up in another. Ravens further states, “Most public sector organizations lack the skills and expertise to design public IoT infrastructures, placing greater reliance, and importance, on vendors… This model is inappropriate for cash-strapped public sector organizations, which as yet are unsure of the business case for IoT.”

Observing the IoT need from a national level, the U.S. Department of Homeland Security (DHS) recently awarded a contract, “to advance detection capability and security monitoring of networked systems, collectively known as the Internet of Things”.  The National Institute for Occupational Safety and Health (NIOSH) has also issued a Request for Information (RFI) for companies to answer what the IoT can do to support First Responders. In their response, the Center for Data Innovation, determined that there are both first- and second- tier sensors usable to emergency responders.  First-tier sensors could include: network-connected smoke and temperature sensors that could detect the location of a fire in a building, wearable sensors that could track the location/status of emergency response personnel at the scene, and accelerometers that could detect the structural compromise of a hospital building after an earthquake.  Second-tier sensors are detectors that are normally used for other purposes.  Satellites with Infrared cameras, for example, could be used to track wildfires to ensure the safety of ground crews, a customer’s cellphone could be used to detect and locate a car crash, and neighborhood air quality sensors could be used to track the spreading of a fire or toxic spill.  These can be very helpful, but are they secure from being spoofed by a IoT hacker?

In a 1970s episode of Hawaii Five-O, a group of would-be jewel thieves used their knowledge of the Tsunami warning system to fake a warning and evacuate Honolulu.  With this done, they would have been able to break into any jewelry store and freely take what they wanted.  Only when the authorities noticed that the first sign of a tsunami (a drastically receding tide) did not occur as predicted, were they able to find out that the warning was a fake.  While we hope that no one would use the IoT in this manner, such hope is not a prudent governmental policy option.  Governments need to ensure that the IoT used by First Responders is secure enough to prevent risk to property loss and human life.

 

Dwight Bues, of Engility Corp., is a Georgia Tech Computer Engineer with 30+ years’ experience in computer hardware, software, and systems and interface design. He has worked in Power Generation, Communications, RF, Command/Control, and Test Systems. Dwight is a Certified Scrum Master and teaches courses in Architecture, Requirements, and IVV&T. He is also a certified Boating Safety instructor with the Commonwealth of Virginia and the United States Power Squadrons. He is currently working several STEM projects, sponsoring teams for competitions in the Aerospace Industries Association’s (AIA) Team America Rocketry Challenge (TARC) and the Robotics Education and Competition Foundation’s, Vex Skyrise Robotics Challenge.

Kevin L. Jackson is a globally recognized cloud computing expert, a cloud computing and cybersecurity Thought Leader for Dell and IBM and Founder/Author of the award winning “Cloud Musings” blog. Mr. Jackson has also been recognized as a “Top 100 Cybersecurity Influencer and Brand” by Onalytica (2015), a Huffington Post “Top 100 Cloud Computing Experts on Twitter” (2013), a “Top 50 Cloud Computing Blogger for IT Integrators” by CRN (2015) and a “Top 5 Must Read Cloud Blog” by BMC Software (2015). His first book, “GovCloud: Cloud Computing for the Business of Government” was published by Government Training Inc. and released in March 2011. His next publication, “Practical Cloud Security: A Cross Industry View”, will be released by Taylor & Francis in the spring of 2016

 ( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.)

Cloud Musings

( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2015)

Follow me at https://Twitter.com/Kevin_Jackson
Posted in

G C Network